咨询与建议

限定检索结果

文献类型

  • 1,773 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,148 篇 工学
    • 1,060 篇 计算机科学与技术...
    • 830 篇 软件工程
    • 425 篇 信息与通信工程
    • 380 篇 电子科学与技术(可...
    • 364 篇 电气工程
    • 257 篇 控制科学与工程
    • 171 篇 化学工程与技术
    • 164 篇 机械工程
    • 155 篇 材料科学与工程(可...
    • 149 篇 仪器科学与技术
    • 128 篇 生物工程
    • 126 篇 光学工程
    • 120 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 68 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 65 篇 安全科学与工程
    • 57 篇 建筑学
    • 57 篇 土木工程
    • 56 篇 生物医学工程(可授...
  • 1,285 篇 理学
    • 487 篇 数学
    • 473 篇 物理学
    • 167 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 151 篇 大气科学
    • 141 篇 化学
    • 93 篇 系统科学
  • 406 篇 管理学
    • 273 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 79 篇 法学
  • 78 篇 医学
  • 57 篇 农学
  • 54 篇 军事学
  • 40 篇 经济学
  • 8 篇 教育学
  • 7 篇 艺术学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 47 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 26 篇 neural networks
  • 26 篇 blockchain
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 174 篇 state key labora...
  • 151 篇 national key lab...
  • 111 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 71 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 35 篇 state key labora...
  • 34 篇 state key labora...
  • 31 篇 science and tech...
  • 31 篇 shandong provinc...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 29 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 25 篇 ai bo
  • 24 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 17 篇 xiaohui kuang
  • 16 篇 guo hong

语言

  • 3,033 篇 英文
  • 151 篇 中文
  • 107 篇 其他
  • 4 篇 法文
  • 3 篇 德文
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3288 条 记 录,以下是121-130 订阅
排序:
S2KAN-SLAM: Elastic Neural LiDAR SLAM with SDF Submaps and Kolmogorov-Arnold Networks
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年
作者: Wang, Zhong Zhang, Lin Wang, Hesheng Shanghai Jiao Tong University State Key Laboratory of Avionics Integration and Aviation System-of-Systems Synthesis Department of Automation Key Laboratory of System Control and Information Processing of Ministry of Education Shanghai200240 China Tongji University School of Computer Science and Technology National Pilot Software Engineering School with Chinese Characteristics Shanghai201804 China
Traditional LiDAR SLAM approaches prioritize localization over mapping, yet high-precision dense maps are essential for numerous applications involving intelligent agents. Recent advancements have introduced methods l... 详细信息
来源: 评论
In-situ Monitoring of Maximum and Average Chip Junction Temperature within Multichip IGBT Power Modules Using Kelvin Emitter Voltage
收藏 引用
IEEE Journal of Emerging and Selected Topics in Power Electronics 2025年
作者: Yang, Jianxiong Ran, Li Che, Yanbo Du, Mingxing Tianjin University of Technology Tianjin Key Laboratory of Control Theory and Applications in Complicated System Tianjin300384 China Chongqing University State Key Laboratory of Power Transmission Equipment and System Security and New Technology School of Electrical Engineering Chongqing400044 China University of Warwick School of Engineering CoventryCV4 7AL United Kingdom Tianjin University Key Laboratory of Smart Grid of Ministry of Education School of Electrical and Information Engineering Tianjin300072 China
Parallel configurations of power chips within a multichip IGBT power module (M-IGBT-PM) are employed to meet the required current and power ratings. When the internal chips of an M-IGBT-PM experience uneven temperatur... 详细信息
来源: 评论
Giant Tunneling Magnetoresistance Based on Spin-Valley-Mismatched Ferromagnetic Metals
收藏 引用
Physical Review Letters 2025年 第3期134卷 036302-036302页
作者: Kun Yan Li Cheng Yizhi Hu Junjie Gao Xiaolong Zou Xiaobin Chen School of Science State Key Laboratory on Tunable Laser Technology and Ministry of Industry and Information Technology Key Lab of Micro-Nano Optoelectronic Information System Harbin Institute of Technology Shenzhen Shenzhen 518055 China Shenzhen Geim Graphene Center and Shenzhen Key Laboratory of Advanced Layered Materials for Value-added Applications Institute of Materials Research Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen 518055 China Collaborative Innovation Center of Extreme Optics Shanxi University Taiyuan 030006 China
Half metals, which are amenable to perfect spin filtering, can be utilized for high-magnetoresistive devices. However, available half metals are very limited. Here, we demonstrate that materials with intrinsic spin-va... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Defense Against Adversarial Faces at the Source: Strengthened Faces Based on Hidden Disturbances
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Li, Shuangliang Wang, Jinwei Wu, Hao Zhang, Jiawei Cheng, Xin Luo, Xiangyang Ma, Bin School of Software Nanjing Universityof Information Science and Technology Nanjing210044 China College of Cryptology and Cyber Science Nankai University Tianjing300073 China State Key Laboratory of Mathemat-ical Engineering and Advanced Computing Zhengzhou450002 China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China School of Cyber Security Qilu University of Technology Shandong Academy of Sciences Shandong250353 China
Face Recognition (FR) systems, while widely used across various sectors, are vulnerable to adversarial attacks, particularly those based on deep neural networks. Despite existing efforts to enhance the robustness of F... 详细信息
来源: 评论
Opposite long-term trends in precipitation during spring and summer over the Pamir Plateau and influential factors
收藏 引用
Atmospheric Research 2025年 323卷
作者: Chen, Ping Sun, Bo Wang, Huijun Yao, Junqiang State Key Laboratory of Climate System Prediction and Risk Management Key Laboratory of Meteorological Disaster Ministry of Education Collaborative Innovation Center on Forecast and Evaluation of Meteorological Disasters Nanjing University of Information Science and Technology Nanjing210044 China School of Atmospheric Sciences Nanjing University of Information Science and Technology Nanjing210044 China Zhuhai China Institute of Desert Meteorology China Meteorological Administration Urumqi830002 China
As a vital part of the water tower of Asia, water cycle changes in the Pamir Plateau have significant impacts on the climate of the arid inland regions of Central Asia. Using the high-precision precipitation dataset k... 详细信息
来源: 评论
Towards Expanding Precise Timing for Collaborative Its with Deterministic Communications in 6G
Towards Expanding Precise Timing for Collaborative Its with ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Hongxing Li Haotian Li Qianhan Gao Guochu Shou Yaqiong Liu Zhigang Guo Yihong Hu State Key Laboratory of Networking and Switching Technology School of Computer Science (National Pilot Software Engineering School) Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
The demand for precise timing continues to grow with the rapid development of smart cities, where intelligent transportation emerges as a critical application heavily dependent on accurate time distribution. Determini... 详细信息
来源: 评论
Bidirectional generative diffusion model with cascaded symmetric attention for brain connectivity-to-connectivity translation
收藏 引用
Biomedical Signal Processing and Control 2025年 108卷
作者: Zuo, Qiankun Di, Yi Ye, Conghuan Shi, Binghua Chen, Junyi Wei, Hui Li, Ruiheng Lei, Bangjun Hubei Key Laboratory of Digital Finance Innovation Hubei University of Economics Hubei Wuhan430205 China School of Information Engineering Hubei University of Economics Hubei Wuhan430205 China The State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400044 China Hubei Internet Finance Information Engineering Technology Research Center Hubei University of Economics Hubei Wuhan430205 China
Understanding the complex relationship between structural and functional connectivity is fundamental to discovering the pathogenesis of brain diseases. However, it is challenging to establish nonlinear connective rela... 详细信息
来源: 评论
Pulsating Torque Suppression of Flux Reversal Machines Based on Specific Harmonic Contributions of Rotor Permeance and PM MMF
收藏 引用
IEEE Transactions on Industry Applications 2025年
作者: Li, Junzhou Gao, Yuting Zhang, Chaofeng Zha, Xiaoming Qu, Ronghai Wuhan University School of Electrical Engineering and Automation Wuhan430072 China Key Laboratory of Integrated Energy Power Equipment and System Security Hubei430206 China State Grid Henan Electric Power Research Institute Zhengzhou450052 China Huazhong University of Science and Technology State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronic Engineering Wuhan430074 China
Flux reversal machines (FRMs) exhibit high torque density, but also significant pulsating torque, including cogging torque and torque ripple. Traditional methods fail to separate the harmonics that affect torque densi... 详细信息
来源: 评论
Mimicking the Familiar: Dynamic Command Generation for information Theft Attacks in LLM Tool-Learning system
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Ziyou Li, Mingyang Yang, Guowei Wang, Junjie Huang, Yuekai Chang, Zhiyuan Wang, Qing State Key Laboratory of Intelligent Game Beijing China Science and Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences China University of Queensland Australia
information theft attacks pose a significant risk to Large Language Model (LLM) tool-learning systems. Adversaries can inject malicious commands through compromised tools, manipulating LLMs to send sensitive informati... 详细信息
来源: 评论